> Date: Fri, 10 Apr 2015 15:47:23 +0300
> From: George Kadianakis
>
> David Goulet writes:
>
>>> On 09 Apr (21:58:49), George Kadianakis wrote:
>>> Hello,
>>>
>>> I inline a proposal for Direct Onion Services. It's heavily based on
>>> the "encrypted services" proposal of Roger, but I refined
On Fri, 10 Apr 2015 13:59:05 +
Speak Freely wrote:
> Half in jest, half serious, how about Peeled Onion Service? As this
> proposal is intended to peel away certain features... It clearly
> indicates that though it is an Onion Service, it is not a full fledged
> Onion Service with all the bel
Hello tor-dev,
I'm a master student researching computational stylometry (analyzing writing
style of typed texts) in adversarial settings. Computational stylometry is a
danger to the anonymity of authors who do not take appropriate precautions. A
draft TSOP proposal is attached, it builds upon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Thanks for the reply, I added a trac entry:
https://bugs.torproject.org/15659
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJVKnKuAAoJEFv7XvVCELh0lLUP/0VeXYEeGOI9acQtvY0WoCP/
Qjq6i6h6bRFsmPqs3pa9qqUPKo6RChE0tM8ky+kV3b+DfuFR9oCFxokTG/C3g3Go
pwkvfvh7JN
On Sun, 12 Apr 2015 12:46:26 +
Nusenu wrote:
> tor will fail to startup with the current systemd service file [1]
> if your torrc makes use of the ControlSocket feature.
>
> To work around the issue one has to additionally allow the following
> capabilities:
> CAP_DAC_OVERRIDE
> CAP_CHOWN
> s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
tor will fail to startup with the current systemd service file [1]
if your torrc makes use of the ControlSocket feature.
To work around the issue one has to additionally allow the following
capabilities:
CAP_DAC_OVERRIDE
CAP_CHOWN
since the soc
I found and fixed a big performance limitation in the meek-azure
transport. If you tried meek-azure before, but it was too slow, give it
another try!
meek-azure has always seemed slower than the other two backends, and I
recently spent the time to figure out why. It was a lack of persistent
HTTP c